Why would a network administrator configure port security on a switch?()A、To prevent unauthorized Telnet access to a switch port.B、To limit the number of Layer 2 broadcasts on a particular switch port.C、To prevent unauthorized hosts from accessing the LAN.D、To protect the IP and MAC address of the switch and associated ports.E、To block unauthorized access to the switch management interfaces over common TCP ports.

Why would a network administrator configure port security on a switch?()

  • A、To prevent unauthorized Telnet access to a switch port.
  • B、To limit the number of Layer 2 broadcasts on a particular switch port.
  • C、To prevent unauthorized hosts from accessing the LAN.
  • D、To protect the IP and MAC address of the switch and associated ports.
  • E、To block unauthorized access to the switch management interfaces over common TCP ports.

相关考题:

The network administrator has configured port security on a Ezonexam switch. Why would a network administrator configure port security on this Ezonexam device?A.To prevent unauthorized hosts from getting access to the LANB.To limit the number of Layer 2 broadcasts on a particular switch portC.To prevent unauthorized Telnet or SSH access to a switch portD.To prevent the IP and MAC address of the switch and associated portsE.None of the above

The Ezonexam network administrator wants to ensure that only a single web server can connect to pot Fa0/1 on a catalyst switch. The server is plugged into the switch's Fast Eth. 0/1 port and the network administrator is about to bring the server online. What can the administrator do to ensure that only the MAC address of this server is allowed by switch port Fa0/1? (Choose two)A.Configure port Fa0/1 to accept connections only from the static IP address of the serverB.Configure the MAC address of the server as a static entry associated with port Fa0/1C.Employ a proprietary connector type on Fa0/1 that is incomputable with other host connectorsD.Configure port security on Fa0/1 to reject traffic with a source MAC address other than that of the serverE.Bind the IP address of the server to its MAC address on the switch to prevent other hosts from spoofing the server IP address

A network administrator wants to control which user hosts can access the network based on their MAC address. What will prevent workstations with unauthorized MAC addresses from connecting to the network through a switch?A. BPDUB. Port securityC. RSTPD. STPE. VTPF. Blocking mode

Why would a network administrator configure port security on a switch?() A. To prevent unauthorized Telnet access to a switch port.B. To limit the number of Layer 2 broadcasts on a particular switch port.C. To prevent unauthorized hosts from accessing the LAN.D. To protect the IP and MAC address of the switch and associated ports.E. To block unauthorized access to the switch management interfaces over common TCP ports.

A network administrator must configure 200 switch ports to accept traffic from only the currently attached host devices. What would be the most efficient way to configure MAC-level security on all these ports?()A. Visually verify the MAC addresses and then telnet to the switches to enter the switchport-port security mac-address command.B. Have end users e-mail their MAC addresses. Telnet to the switch to enter the switchport-port security mac-address command.C. Use the switchport port-security MAC address sticky command on all the switch ports that have end devices connected to them.D. Use show mac-address-table to determine the addresses that are associated with each port and then enter the commands on each switch for MAC address port-security.

A network administrator wants to ensure that only the server can connect to port Fa0/1 on a Catalyst switch. The server is plugged into the switch Fa0/1 port and the network administrator is about to bring the server online. What can the administrator do to ensure that only the MAC address of the server is allowed by switch port Fa0/1?()A. Configure port Fa0/1 to accept connections only from the static IP address of the server.B. Employ a proprietary connector type on Fa0/1 that is incompatible with other host connectors.C. Configure the MAC address of the server as a static entry associated with port Fa0/1.D. Bind the IP address of the server to its MAC address on the switch to prevent other hosts from spoofing the server IP address.E. Configure port security on Fa0/1 to reject traffic with a source MAC address other than that of the server.F. Configure an access list on the switch to deny server traffic from entering any port other than Fa0/1.

A network administrator needs to configure port security on a switch.which two statements are true? () A.The network administrator can apply port security to dynamic access portsB.The network administrator can configure static secure or sticky secure mac addresses in the voice vlan.C.The sticky learning feature allows the addition of dynamically learned addresses to the running configuration.D.The network administrator can apply port security to EtherChannels.E.When dynamic mac address learning is enabled on an interface,the switch can learn new addresses,up to the maximum defined.

Which set of commands is recommended to prevent the use of a hub in the access layer?() A.switch(config-if)#switchport mode trunk switch(config-if)#switchport port-security maximum 1B.switch(config-if)#switchport mode trunk switch(config-if)#switchport port-security mac-address 1C.switch(config-if)#switchport mode access switch(config-if)#switchport port-security maximum 1D.switch(config-if)#switchport mode access switch(config-if)#switchport port-security mac-address 1

Why would a network administrator configure port security on a switch()。 A.to prevent unauthorized Telnet access to a switch portB.to limit the number of Layer 2 broadcasts on a particular switch portC.to prevent unauthorized hosts from accessing the LAND.to protect the IP and MAC address of the switch and associated portsE.to block unauthorized access to the switch management interfaces over common TCP ports

You are the network administrator of a small Layer 2 network with 50 users. Lately, users have been complaining that the network is very slow. While troubleshooting, you notice that the CAM table of your switch is full, although it supports up to 12,000 MAC addresses. How can you solve this issue and prevent it from happening in the future?()A、Upgrade the switchesB、Configure BPDU guardC、Configure VLAN access listsD、Configure port securityE、Configure Dynamic ARP inspection

Which set of commands is recommended to prevent the use of a hub in the access layer?()A、switch(config-if)#switchport mode trunk switch(config-if)#switchport port-security maximum 1B、switch(config-if)#switchport mode trunk switch(config-if)#switchport port-security mac-address 1C、switch(config-if)#switchport mode access switch(config-if)#switchport port-security maximum 1D、switch(config-if)#switchport mode access switch(config-if)#switchport port-security mac-address 1

Why would a network administrator configure port security on a switch?()A、to prevent unauthorized Telnet access to a switch portB、to limit the number of Layer 2 broadcasts on a particular switch portC、to prevent unauthorized hosts from accessing the LAND、to protect the IP and MAC address of the switch and associated portsE、to block unauthorized access to the switch management interfaces over common TCP ports

The network administrator has enabled BPDU guard on the LAN.  Why is an effective way to prevent an unauthorized rogue switch from altering the spanning-tree topology of this network? ()A、BPDU guard can be used to prevent invalid BPDUs from propagating throughout the network. B、BPDU guard can guarantee proper selection of the root bridge.C、BPDU guard can be utilized to prevent the switch from transmitteing BPDUs and incorrectly altering the root bridge election.D、BPDU guard can be utilized along with PortFast to shut down ports when a switch is connected to the port.E、None of the other alternatives apply

A network interface port has collision detection and carrier sensing enabled on a shared twisted pair network. From this statement, what is known about the network interface port?()A、This is a 10 Mb/s switch port.B、This is a 100 Mb/s switch port.C、This is an Ethernet port operating at half duplex.D、This is an Ethernet port operating at full duplex.E、This is a port on a network interface card in a PC

The network security policy requires that only one host be permitted to attach dynamically to each switch interfacE.If that policy is violated, the interface should shut down. Which two commands must the network administrator configure on the 2950 Catalyst switch to meet this policy? ()A、Switch1(config-if)# switchport port-security maximum 1B、Switch1(config)# mac-address-table secureC、Switch1(config)# access-list 10 permit ip hostD、Switch1(config-if)# switchport port-security violation shutdownE、Switch1(config-if)# ip access-group 10

A network administrator needs to configure port security on a switch.which two statements are true?()A、The network administrator can apply port security to dynamic access portsB、The network administrator can configure static secure or sticky secure mac addresses in the voice vlan.C、The sticky learning feature allows the addition of dynamically learned addresses to the runningconfiguration.D、The network administrator can apply port security to EtherChannels.E、When dynamic mac address learning is enabled on an interface,the switch can learn new addresses,up to the maximum defined.

A network administrator wants to control which user hosts can access the network based on their MAC address. What will prevent workstations with unauthorized MAC addresses from connecting to the network through a switch?()A、BPDUB、Port securityC、RSTPD、STPE、VTPF、Blocking mode

An administrator would like to configure a switch over a virtual terminal connection from locations outside of the local LAN. Which of the following are required in order for the switch to be configured from a remote location? ()A、The switch must be configured with an IP address,subnet mask,and default gateway.B、The switch must be connected to a router over a VLAN trunk.C、The switch must be reachable through a port connected to its management VLAN.D、The switch console port must be connected to the Ethernet LAN.E、The switch management VLAN must be created and have a membership of at least one switch port.F、The switch must be fully configured as an SNMP agent.

What is the function of the no switchport catalyst switch interface configuration command?()A、Disables the interfaces to prevent traffic flowB、Clears all the configurations on the interfaceC、Switches the port from access mode to trunk modeD、Converts the port from physical Layer 2 port to physical Layer 3 port

An administrator would like to configure a switch over a virtual terminal connection from locations outside of the local LAN. Which of the following are required in order for the switch to be configured from a remote location? ()A、The switch must be configured with an IP address, subnet mask, and default gateway.B、The switch must be connected to a router over a VLAN trunk.C、The switch must be reachable through a port connected to its management VLAN.D、The switch console port must be connected to the Ethernet LAN.E、The switch management VLAN must be created and have a membership of at least one switch

A network administrator must configure 200 switch ports to accept traffic from only the currently attached host devices. What would be the most efficient way to configure MAC-level security on all these ports?()A、Visually verify the MAC addresses and then telnet to the switches to enter the switchport-port security mac-address commandB、Have end users e-mail their MAC addresses. Telnet to the switch to enter the switchport-port security mac-address commandC、Use the switchport port-security MAC address sticky command on all the switch ports that have end devices connected to themD、Use show mac-address-table to determine the addresses that are associated with each port and then enter the commands on each switch for MAC address port-security

单选题Why would a network administrator configure port security on a switch?()Ato prevent unauthorized Telnet access to a switch portBto limit the number of Layer 2 broadcasts on a particular switch portCto prevent unauthorized hosts from accessing the LANDto protect the IP and MAC address of the switch and associated portsEto block unauthorized access to the switch management interfaces over common TCP ports

单选题A network administrator wants to control which user hosts can access the network based on their MAC address. What will prevent workstations with unauthorized MAC addresses from connecting to the network through a switch?()ABPDUBPort securityCRSTPDSTPEVTPFBlocking mode

单选题Which set of commands is recommended to prevent the use of a hub in the access layer?()Aswitch(config-if)#switchport mode trunk switch(config-if)#switchport port-security maximum 1Bswitch(config-if)#switchport mode trunk switch(config-if)#switchport port-security mac-address 1Cswitch(config-if)#switchport mode access switch(config-if)#switchport port-security maximum 1Dswitch(config-if)#switchport mode access switch(config-if)#switchport port-security mac-address 1

单选题Why would a network administrator configure port security on a switch?()ATo prevent unauthorized Telnet access to a switch port.BTo limit the number of Layer 2 broadcasts on a particular switch port.CTo prevent unauthorized hosts from accessing the LAN.DTo protect the IP and MAC address of the switch and associated ports.ETo block unauthorized access to the switch management interfaces over common TCP ports.

单选题The network administrator has enabled BPDU guard on the LAN.  Why is an effective way to prevent an unauthorized rogue switch from altering the spanning-tree topology of this network? ()ABPDU guard can be used to prevent invalid BPDUs from propagating throughout the network. BBPDU guard can guarantee proper selection of the root bridge.CBPDU guard can be utilized to prevent the switch from transmitteing BPDUs and incorrectly altering the root bridge election.DBPDU guard can be utilized along with PortFast to shut down ports when a switch is connected to the port.ENone of the other alternatives apply

多选题A network administrator wants to ensure that only the server can connect to port Fa0/1 on a Catalyst switch. The server is plugged into the switch Fa0/1 port and the network administrator is about to bring the server online. What can the administrator do to ensure that only the MAC address of the server is allowed by switch port Fa0/1?()AConfigure port Fa0/1 to accept connections only from the static IP address of the server.BEmploy a proprietary connector type on Fa0/1 that is incompatible with other host connectors.CConfigure the MAC address of the server as a static entry associated with port Fa0/1.DBind the IP address of the server to its MAC address on the switch to prevent other hosts from spoofing the server IP address.EConfigure port security on Fa0/1 to reject traffic with a source MAC address other than that of the server.FConfigure an access list on the switch to deny server traffic from entering any port other than Fa0/1.